Follow
Stacey Watson
Stacey Watson
Verified email at uwaterloo.ca - Homepage
Title
Cited by
Cited by
Year
Motivating students beyond course requirements with a serious game
S Watson, H Richter Lipford
Proceedings of the 50th ACM Technical Symposium on Computer Science …, 2019
162019
Evaluating two methods for integrating secure programming education
M Tabassum, S Watson, B Chu, HR Lipford
Proceedings of the 49th ACM Technical Symposium on Computer Science …, 2018
162018
A review of literature on accessibility and authentication techniques
S Andrew, S Watson, T Oh, GW Tigwell
Proceedings of the 22nd International ACM SIGACCESS Conference on Computers …, 2020
152020
Comparing Educational Approaches to Secure programming: Tool vs.{TA}
M Tabassum, S Watson, H Richter Lipford
Thirteenth Symposium on Usable Privacy and Security ({SOUPS} 2017), 2017
13*2017
Student and teacher perspectives of learning asl in an online setting
GW Tigwell, RL Peiris, S Watson, GM Garavuso, H Miller
Proceedings of the 22nd International ACM SIGACCESS Conference on Computers …, 2020
82020
Development of an architecture for a cyber-physical emulation test range for network security testing
AF Browne, S Watson, WB Williams
IEEE Access 6, 73273-73279, 2018
82018
OneButtonPIN: A single button authentication method for blind or low vision users to improve accessibility and prevent eavesdropping
MV Kamarushi, SL Watson, GW Tigwell, RL Peiris
Proceedings of the ACM on Human-Computer Interaction 6 (MHCI), 1-22, 2022
72022
A Proposed Visualization for Vulnerability Scan Data.
S Watson, HR Lipford
SOUPS, 2017
62017
VibroAuth: authentication with haptics based non-visual, rearranged keypads to mitigate shoulder surfing attacks
M Varma, S Watson, L Chan, R Peiris
International Conference on Human-Computer Interaction, 280-303, 2022
52022
Survey of non-malicious user actions that introduce network and system vulnerabilities and exploits
A Robles, J Norris, S Watson, AF Browne
SoutheastCon 2018, 1-5, 2018
42018
Twentieth Century Bibliography and Textual Criticism: An Annotated Bibliography
K Womack
Greenwood Press, 2000
4*2000
Cybersecurity across all disciplines in 2020
R Weiss, X Mountrouidou, S Watson, J Mache, E Hawthorne, ...
Proceedings of the 51st ACM Technical Symposium on Computer Science …, 2020
32020
Developing Soft Skills with a Classroom Behavior Management Game
S Watson, JC Bahamón, H Ramaprasad, H Richter Lipford
Proceedings of the 49th ACM Technical Symposium on Computer Science …, 2018
22018
Authentication Challenges in Customer Service Settings Experienced by Deaf and Hard of Hearing People
S Andrew, SL Watson, T Oh, GW Tigwell
Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing …, 2023
12023
Computer simulations and gaming
JW Cooper, ME Yoder, SL Watson
Edward Elgar Publishing, 2022
12022
Using forcing functions to improve student preparedness in an operating systems and networking class
H Ramaprasad, JC Bahamón, RH Jones, S Watson
Proceedings of the 51st ACM Technical Symposium on Computer Science …, 2020
12020
Conceptualtheoretical frame for computer simulations and gaming
J Cooper, M Yoder, S Watson
Computer Simulations and Gaming, 1-33, 2022
2022
Tables
J Cooper, M Yoder, S Watson
Computer Simulations and Gaming, 2022
2022
Considerations for use of computer simulations and games
J Cooper, M Yoder, S Watson
Computer Simulations and Gaming, 34-85, 2022
2022
Tools and resources
J Cooper, M Yoder, S Watson
Computer Simulations and Gaming, 154-157, 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–20